user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:W97M/Valyria!mclg
Trojan:W97M/Valyria!mclg - Windows Defender threat signature analysis

Trojan:W97M/Valyria!mclg - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:W97M/Valyria!mclg
Classification:
Type:Trojan
Platform:W97M
Family:Valyria
Detection Type:Concrete
Known malware family with identified signatures
Suffix:!mclg
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for W97M platform, family Valyria

Summary:

Trojan:W97M/Valyria is a malicious macro embedded within Microsoft Office documents, typically delivered via spam email. When the user enables macros, the trojan executes to download and install more dangerous secondary payloads, such as ransomware or banking trojans.

Severity:
Critical
VDM Static Detection:
No detailed analysis available from definition files.
Known malware which is associated with this threat:
Filename: Arabic.dotm
28de2ccff30a4f198670b66b6f9a0ce5f5f9b7f889c2f5e6a4e365dea1c89d53
11/11/2025
Remediation Steps:
Isolate the affected host from the network immediately. Ensure the malicious document has been quarantined and run a full system scan for secondary infections. Investigate for further compromise and block Office macros from the internet via Group Policy.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 11/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$